Description
The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 8.6.0 via the getFullContent() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Published: 2025-11-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated Server‑Side Request Forgery
Action: Patch Now
AI Analysis

Impact

The Blog2Social plugin for WordPress contains a blind Server‑Side Request Forgery vulnerability that can be triggered via the getFullContent() function. Authenticated users with Subscriber or higher privileges can make the application issue HTTP requests to arbitrary URLs, enabling them to probe and potentially manipulate internal network resources. The flaw permits the attacker to read or modify data on internal services, compromising data confidentiality and integrity.

Affected Systems

The vulnerability affects all releases of the Blog2Social: Social Media Auto Post & Scheduler plugin up to and including version 8.6.0. Users running those versions on any WordPress installation are potentially impacted.

Risk and Exploitability

The CVSS base score of 4.3 indicates moderate severity; the EPSS score of less than 1% suggests a very low current exploitation probability. The flaw is not listed in the CISA KEV catalog. Exploitation requires the attacker to log in with at least Subscriber level privileges and to craft a request targeting the vulnerable function. If internal services are reachable from the server, the vulnerability can be used to exfiltrate data or perform unauthorized actions, but the lack of public exploitation data and the low EPSS score mitigate immediate risk.

Generated by OpenCVE AI on April 22, 2026 at 21:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Blog2Social plugin to the latest release that removes the SSRF issue.
  • If the plugin is not needed, uninstall or disable it entirely.
  • Apply the principle of least privilege by removing Subscriber access or restricting those roles from performing actions that load external content until the patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 21:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Thu, 06 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Blog2social
Blog2social blog2social
Wordpress
Wordpress wordpress
Vendors & Products Blog2social
Blog2social blog2social
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 8.6.0 via the getFullContent() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Title Blog2Social: Social Media Auto Post & Scheduler <= 8.6.0 - Authenticated (Subscriber+) Blind Server-Side Request Forgery via post_url
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Blog2social Blog2social
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:27.427Z

Reserved: 2025-10-31T18:01:44.334Z

Link: CVE-2025-12560

cve-icon Vulnrichment

Updated: 2025-11-06T15:40:54.557Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T06:15:44.340

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12560

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:30:27Z

Weaknesses